Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Delivering the Digital Government Mission
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Monday - Friday, 6-9 a.m.
Host Tom Temin brings you the latest news affecting the federal community each weekday morning, featuring interviews with top government executives and contractors. Listen live from 6 to 9 a.m. or download archived interviews below.
GAO: Cyber data sharing is lacking
Thursday - 8/19/2010, 8:30am EDT
Cybersecurity Update - Tune in weekdays at 30 minutes past the hour for the latest cybersecurity news on the Federal Drive with Tom Temin and Amy Morris (6-10 a.m.) and the DorobekINSIDER with Chris Dorobek (3-7 p.m.). Listen live at FederalNewsRadio.com or on the radio at 1500 and 820 AM in the Washington, D.C. metro area. The Cybersecurity Update is brought to you by Tripwire.
- The federal government is not living up to private sector expectations for cybersecurity information-sharing. That's according to a new GAO report. More than 9-in-10 survey respondents from the defense, banking and other industries say they expect at least moderate amounts of "timely and actionable cyber threat information". But only 27-percent say they've received it. GAO warns that if things don't improve, the owners of critical infrastructure, like power systems, won't have the information they need to stop catastrophic cyber attacks.
- You can learn more about CyberSecurity in Second Life. The CyberWatch organization, an Advanced Technological Education Center funded by the National Science Foundation, is launching a 3D online virtual environment in Second Life to teach members about cybersecurity issues. The so-called island will feature classrooms, meeting spaces, private and public auditoriums, and information about CyberWatch. The group will also use the virtual environment to conduct workshops and presentations to their members and for the public. Second Life users can access the CyberWatch region using this link: maps.secondlife.com/secondlife/CyberWatch/123/50/23
- If you're looking for Cameron Diaz, Julia Roberts or Jessica Biel online, look out! The movie stars top the latest list of the most dangerous celebrities to search for online, according to new research by computer-security software maker McAfee Inc. It's far from an Oscar, but landing atop McAfee's annual list carries a distinction all its own: It means that criminals believe those celebs are the perfect lures to sucker people into visiting malicious websites. Clicking onto strange sites is sketchy to begin with. But many people do, and their computers get infected. Once a computer is infected, criminals can steal victims' online banking passwords, e-mail passwords, and do other kinds of nasty deeds.
Check out all of Federal News Radio's coverage of cybersecurity issues here.